• Aucun résultat trouvé

Action and artifact : the structuring of technologies-in-use

N/A
N/A
Protected

Academic year: 2021

Partager "Action and artifact : the structuring of technologies-in-use"

Copied!
41
0
0

Texte intégral

(1)

Action and Artifact:

The Structuring of Technologies-in-Use by

Wanda J. Orlikowski

(2)

Action and Artifact:

The Structuring of Technologies-in-Use

Wanda J. Orlikowski Sloan School of Management Massachusetts Institute of Technology

50 Memorial Drive Cambridge, MA 02139 (617) 253-0443 wanda@mit.edu October 1995 ACKNOWLEDGMENTS

The author gratefully acknowledges the support of the Center for Coordination Science at the Massachusetts Institute of Technology. The paper has benefited from comments made by participants at the Winter Conference on Technology, Innovation and Organizations, Stanford University, December 1994.

(3)

Action and Artifact:

The Structuring of Technologies-in-Use

ABSTRACT

This paper proposes "technologies-in-use" as a concept for analyzing technological use and change in organizations. Technologies-in-use are proposed as the situated and patterned interactions of a technological artifact and human action. Such a perspective facilitates an analysis of the technological capabilities actually realized in practice, instead of depending on accounts of prescribed features, or the social constructions made of them. This distinction between the technology-as-used and the technology-as-artifact helps to overcome some of the difficulties faced by the multiple, equivocal notions of technology characterizing prior organizational research. The usefulness of the perspective is illustrated by examining two firm's deployment of a particular information technology artifact and the various technologies-in-use enacted by the actors who used it. The paper suggests that a focus on technologies-in-use offers a systematic analytic lens with which to examine the various kinds of action taken with technological artifacts in particular contexts, how and why these differ, and how and why they may be associated with different intended and unintended organizational outcomes.

(4)

Technology does not exist in a vacuum. It is used in specific organizational contexts, interacting with work practices, social cognitions, political cultures, and institutional structures. The use of technology in organizations is neither uniform nor invariant, but thoroughly shaped by the intentions, interests, interpretations, interactions, innovations, and inertia of human agents. As organizational researchers, we know this about technology and its use, but for years our theories have struggled to fully account for the situated and interactive nature of technology. In this paper, I propose a framing of technology that may help some of these struggles. In particular, I argue that "technology"--the technology of interest in organizational research--is not sensibly conceptualized apart from the everyday activities of humans in specific historical and contextual conditions, and as such must be understood as a social practice.

The history of technology studies reveals a number of different approaches to conceptualizing technology (see reviews by Barley, 1988; Marx and Smith, 1994; Powell, 1988; Scott, 1990). In these different approaches -- contingency (e.g., Blau et al. 1976), sociotechnical (e.g., Trist et al., 1986), labor process (e.g., Knights and Willmott, 1988), social constructivist (e.g., Pinch and Bijker, 1984), network-based (e.g., Burkhardt and Brass, 1990), and structurational (e.g., Barley, 1986) -- technology has figured variously as material object, control mechanism, knowledge, task environment, social construction, social object, and social structure. Despite often deep ontological divides, these perspectives have in common an interest in the impact of particular kinds of technology on work, skills, performance, roles, structures, cultures, and so on. Their research focus, by design, assumes that technology is separable and separate from human action. This sort of detachment may be useful for purposes such as investigating macrotrends in technological deployment across organizations and industries, but as a general assumption about the nature and influence of technology in organizational life, it is misleading. It is misleading, because technology is of little organizational significance if it is not applied or used. As Orlikowski (1992a:410) notes, "It is only through human action that technology qua technology can be understood." To appropriate Kent's (1993:11) point about language: technology becomes technology only when it is used, and this use of technology -- technology-in-use -- defines its nature and its influence in human affairs.

The framing of technology outlined in this paper focuses on technology not as physical entity or social construction, but as a set of constraints and enablements realized in practice. A key proposition is that the technological artifact used or made sense of by actors, is analytically different from what actors actually do with that artifact in practice. Such a distinction has been blurred in the past, and as a result, our understandings of the role of technology in organizations have often seemed unduly materialistic or subjectivist. A number of scholars have called for a

(5)

distinction between technology and technology in action (Sproull and Goodman, 1990; Weick, 1990), but this has not yet been incorporated into our studies and conceptualizations of technology. This is my intent here. While the perspective I offer here is premised on the centrality of agency in technology use, it also recognizes that technologies have an artifactual nature. This perspective acknowledges the duality between, on the one hand, technology as artifact, a bundle of physical and/or conceptual features characterized by particular material and informational properties, and on the other hand, technology-in-use, the patterned interactions of human agents with a particular technological artifact in specific historical and contextual circumstances.

The theoretical shift proposed here is not simply semantic, but has critical practical and research implications. The positing of technology as a duality of action and artifact provides a conceptual apparatus with which to recognize and examine when and how technology use departs from a

priori expectations, prescribed features, or intended outcomes. Rather than seeking uniform and

universal effects from particular material objects, or examining the various consequences resulting from different social constructions, this perspective focuses on identifying the practices that actors engage in with particular technological artifacts in various historical and institutional contexts. In the following, I use the notions of enactment (Weick, 1979) and structuring (Giddens, 1984) to develop the concept of technologies-in-use as the situated and patterned interactions of technological artifact and human action. I illustrate this theoretic framing by drawing on an investigation of various actors' experiences with a particular technological artifact, a software product intended to support collaborative work, in two organizational settings. The empirical evidence highlights, not only that different actors interpreted and appropriated the artifact differently, but that they enacted different social practices with it. It is in identifying and understanding these technologies-in-use, that organizational research can offer a systematic yet

situated and dynamic account of the nature and influence of technology in organizations.

TECHNOLOGICAL ARTIFACTS AND TECHNOLOGIES-IN-USE

The duality of technology posited here is of artifact on the one hand, and the situated patterns of use involved in utilizing that artifact, technology-in-use. A technological artifact can be seen to be a set of features bundled together into an identifiable and bounded package. Such features may be material (as in a tool such as a hammer), conceptual (as in a technique such as TQM), or both (as in a computer imaging device and its prescribed radiographic procedures). Artifacts are usually designed and developed under the auspices of explicit objectives and to some particular specifications. Correspondence between constructed artifact and developers' objectives is certainly not guaranteed, particularly in the case of complexity and novelty. On the contrary, the production

(6)

process typically generates modifications and deviations -- intended and unintended, recognized and unrecognized -- that result in an artifact that resembles but rarely reproduces an a priori design. Once developed, an artifact is packaged, labeled, and marketed so as to convey a certain impression of its features and potential functionality. Whether through persuasion or imposition, artifacts then get deployed in a variety of historical and organizational contexts of use, where some or all of their features may be appropriated by actors in their ongoing practices.

In their action, actors' intentions, interpretations, and institutional context influence how they utilize the artifacts. While the artifact and context of use may prescribe and proscribe particular images and forms of use, how actors make sense of the artifact and what they actually do with it is not predetermined. The use of technological artifacts is an ongoing human accomplishment through which particular technological constraints and enablements are enacted. Giddens (1984) proposed the notion of structure as the enacted set of rules and resources that inform and enable social action. Applying that notion to the use of technology, the concept of technology-in-use can be understood as the social structure (the set of rules and resources) mobilized by actors in the ongoing and situated use of a particular technological artifact. In this framing, technology-in-use is both the medium and the outcome of situated human action.

Distinguishing between technological artifacts and what people actually do with them in practice is useful because it allows an analytical separation of the potential capabilities of a technological artifact and the capabilities actually mobilized. Thus, we can compare actual use to prescribed or potential use, or trace how the use of a given artifact changes over time or varies by context. Such analyses are not possible where the artifact is conflated with use. Investigations of technology use have tended to concentrate on the artifacts themselves or users' attitudes towards or social constructions of artifacts. While useful, such conceptualizations still do not get at the use of technology in practice. That is where the conceptual lens of technologies-in-use offers a unique perspective.

Whittington (1992:695-6) notes that in Giddens' view, "structures themselves have no reality except as they are instantiated in activity or retained mentally as remembered codes of conduct or rights to resources." In social life, actors do not enact structures in a vacuum; they draw on their knowledge of prior action and the rules and resources that animated those actions, and in this way, apply remembered codes and rights to "structure" their current action. Thus, the structures (rules and resources) enacted by prior human action come to shape individuals' current action, which in turn recreates the structures anew (with our without modification). While actors display knowledgeability and capability in their action, these are not entirely conscious or deliberate. Much

(7)

of the knowledgeability and capability of human conduct is displayed "in the vast variety of tacit modes of awareness and competence," or what he calls "practical consciousness" (Giddens, 1981:163). This vocabulary for understanding the structuring of social practices is a useful one for developing a perceptive on technologies-in-use as virtual structures, sets of rules and resources that are realized in human action, informed largely by practical consciousness, and enacted in specific historical and contextual conditions.

The structuring of technologies-in-use suggests that when a technological artifact is introduced into a context, actors develop knowledge and understanding, both explicit and tacit, about the kinds of features offered by the artifact, the sorts of uses to which that artifact may be put within certain contexts of use, and the likely outcomes of such uses. This knowledge is often derived from knowledge of other or previous technological artifacts and prior enactments of technologies-in-use. For example, architects' use of Computer-Aided Design technology often reflects their familiarity with drawing in two-dimensional space, a process afforded by their prior use of pencil and paper. As a result, they may not appreciate the possibility and advantages of drawing in the three-dimensional space facilitated by the new technology. Users' knowledge of an artifact is also influenced by the images and instructions, demonstrations and directions, presented by vendors, champions, trainers, and local management (Orlikowski, et al. 1995). In appropriating the technological artifact in their ongoing action, users constitute a pattern of using the artifact that defines and establishes a particular technology-in-use. This enacted technology-in-use may be understood as the set of rules and resources that structure users' interaction with the artifact in practice. Over time, ongoing enactment of the same technology-in-use tends to reinforce that pattern of use, so that it becomes routinized, an expedient and habitual response to use of the artifact within the daily exigencies of organizational life. The establishment and routinization of particular technologies-in-use within an organization reflects the social tendency towards institutionalization of practices (Zucker, 1977). Once institutionalized, technologies-in-use serve as "behavioral and interpretive templates" (Barley, 1988) for using technological artifacts within the organization.

Institutionalized technologies-in-use, like social structures in general, tend to become reified, and rather than serving as effective guides to action, they may come to be treated as predetermined and incorrigible rules and resources that determine future interactions with the technological artifact. For example, Tyre and Orlikowski (1994) found that early patterns of technology use tend to become congealed and difficult to change subsequently, while Orlikowski (1991) shows how the design assumptions built into a software development tool influenced its users so that they had difficulty conceiving of and developing systems which deviated from the tool's assumptions.

(8)

However, patterns of technology use can and do change with time, changing circumstances, and revised motivations. They change through the same process that social structures in general are changed -- human action. Whether deliberately or inadvertently, every time actors use a technological artifact they reaffirm the prior technology-in-use or they modify it. Modifications may result from deliberate adjustments to patterns of use, for example, supervisors requiring workers to engage safety mechanisms during machine operation, or writers creating customized templates in the use of desktop publishing software. Or they may be occasioned by inadvertent slippages or breakdowns, when, either through inattention or error, users fall into a different form of use, such as forgetting to attach safety guards, or halting use of a component because it is unreliable or awkward to use. Changes may also result from improvisations -- situated innovations responding to an unexpected opportunity or problem -- such as when a temporary workaround or experiment becomes regular practice because it turned out to be more effective than the original mode of operation.

Technologies-in-Use: Rules

Giddens (1984) defines rules as generalizable procedures constituted in the enactment of social life. This enacted definition of rules departs from our everyday understanding of rules as external, given prescriptions for social conduct that may be formalized in corporate policy (e.g., production orders, safety regulations), legislation (e.g., tax law, traffic rules), or exist informally as in articulated or unarticulated "ground rules" or "rules of thumb." Giddens' rules are also not to be confused with cognitive schemas or "mental structures" as some have suggested (Sewell, 1992). Conceiving of rules as either external prescriptions or mental constructs assumes they have an existence outside of practice, and hence departs from the notion of rules as constituted in action. Taylor, in a recent discussion, critiques these two commonplace (mis)conceptions of rules -- the

subjectivist reduction to cognitive phenomena and the objectivist reification:

We may attribute formulations of the rule as thoughts to the agents. ... [or we may] see the rule-as-represented as defining an underlying "structure." We conceive this as what is really causally operative, behind the backs of the unsophisticated agents, as it were.(1993:55)

Noting that both distort the nature of rules by removing the essential role of agency, he continues: In its operation, the rule exists in the practice it "guides." ... the practice not only fulfills the rules, but also gives it concrete shape in particular situations. ... In fact, what this reciprocity shows is that the "rule" lies essentially in the practice. The rule is what is animating the practice at any given time, not some formulation behind it, inscribed in our thoughts or our brains or our genes or whatever. That is why the rule is, at any given time, what the practice has made it. (1993:57-58, emphasis in original)

While individuals have knowledge of various substantive or normative procedures, such knowledge does not in and of itself constitute rules because it may not be drawn on in action. For example, individuals may have detailed knowledge of the operations of tabulator equipment (Yates, 1993), or the codes of conduct that prevail among the computer hacker community (Turkle, 1984), but they typically do not use these to inform their contemporary behavior. While knowledge of

(9)

tabulator function or hacker custom constitutes part of these individuals' interpretive schemes, it does not constitute rules (in the structurational sense) until that knowledge informs their action.

So it is with the substantive and normative procedures that are built into or prescribe the operation of technological artifacts. Through their design, construction, and packaging, technological artifacts come to reflect and embody specific assumptions, procedures, and knowledge about the world and use of artifacts within it (Noble, 1984; Perrow, 1983; Suchman, 1987; Winner, 1986). For example, automobiles reflect knowledge as diverse as combustion engines and styling preferences, and they embody procedures for appropriate operation (such as, shifting gears with the clutch engaged, not moving with the brakes on or seatbelts off, etc.). When used regularly to

facilitate action, the knowledge and procedures embodied within the technological artifact become enacted as rules, as part of the technology-in-use. Not all the knowledge and procedures composing the artifact need be activated all the time (e.g., not using windshield wipers when it's not raining), and not all the knowledge and procedures need be activated intendedly. Further, some of the knowledge and procedures may be enacted differently to that intended by the designers (e.g., driving without engaging the seatbelts). Different actors may generate different rules for their use of a technological artifact and these are likely influenced by their engagement in different social contexts. For example, taxi drivers utilize their automobiles differently when they are "being a cabbie" than when they act as private citizens. The different use practices or technologies-in-use enacted in those different circumstances are also likely to differ from the use practices of ambulance drivers, learner drivers, and drunk drivers. Thus, while the technological artifact in each case may be similar or perhaps even the same, the contexts of its use and the intentions, knowledgeability, and capabilities employed by the human actors utilizing the artifact will vary, generating a variety of technologies-in-use.

When enacted as rules, the knowledge or procedures that are embodied in an artifact, serve as enablements and constraints on users' actions. For example, thousands of Americans annually use a tax preparation software program to complete their tax returns. Knowledge of the Federal tax code, mathematics, and the structure and requirements of various tax forms informed the design of this artifact. As people use the software program, they enact that knowledge as tax reporting rules which enable the creation of various forms (e.g., a "1040 Form") and appropriate accompanying worksheets. Simultaneously, the enactment of those rules constrains these individuals' ability to use the artifact to create alternative tax reporting representations (say a "999 Form"), to follow the procedures of the British tax code, or to calculate the totals in a more "creative" way. Distinguishing between knowledge of rules and rules themselves allows the examination of how knowledge is used (or not used) in the enactment of particular rules in various circumstances, and

(10)

when or how enacted rules may deviate from knowledge of rules in practice. For example, when the IRS instituted a change in filing procedures by allowing electronic filing of tax returns, some users changed their pattern of using tax preparation software by performing all the work electronically and then simply downloading the completed electronic "forms" to the IRS computers.

Technologies-in-Use: Resources

Giddens (1984:33) defines resources as capabilities or "forms of transformative capacity" that generate command over objects, goods, or material phenomena, and command over persons in processes of structuring. He has also noted (1977:133) that: "By 'resources' I mean whatever [capabilities] actors are able to bring to bear to facilitate the achievement of their purposes in the course of social interaction." The emphasis is on capabilities that are used in practice. It is important that Giddens' notion of resources not be confused with our common-place understanding of resources as given entities -- whether material, financial, or intellectual -- that may stand apart from action. Such an error is easy enough to make (see for example, Sewell (1992)). Giddens' notion of resources, in contrast, is rooted in the use of material, financial, or intellectual entities in practice through which they provide actors with different capabilities in various contexts. Outside of human action, these entities no longer count as resources, as Giddens

(1984:33) emphasizes:

Some forms of allocative resources (e.g. land, raw materials etc.) might seem to have a real existence. In the sense of having a "time-space" presence this is obviously the case. But their "materiality" does not affect the fact that such phenomena become resources ... only when incorporated within processes of structuration. Akin to rules then, resources are instantiated in human agency.

Technological artifacts embody a range of features, but these are only constituted as resources (in the structurational sense employed here) when they are mobilized in human action. Consider the example of factories. Factories are not resources by virtue of their material existence as so much steel, concrete, and equipment. They only count as resources in the ongoing agency of individuals. In the once-booming US steel and automotive industries, there was a time when steel mills and automobile plants played a dominant role in the production and reproduction of the US economy. At that time, the material properties of mills and plants were used by the men and women who worked in them to generate considerable productive capabilities. Hence, these factories served as important resources in a context and a set of social practices that valued and utilized their productive output. Today, most of the steel mills and many of the automobile plants have been shut down, and these closed factories no longer play a role in the US economy. With their physical properties still very much intact, these mills and plants are no less material phenomena with a particular existence in time and space. But they are no longer resources in structurational terms,

(11)

because they are no longer implicated in the ongoing action of human agents; hence, they no longer generate transformative capacity for human action. In a context redefined by global trade and electronic technology, the material stock of these mills and plants is no longer seen as useful by human agents -- at least for the time being. The qualification is important, because conditions can and do change, and a reevaluation of these old mills and plants in the future may again find in their material properties (or some modified version thereof) the opportunity to generate transformative capacity for human action. At that point those factories may serve, once again, as resources if they are drawn on by human agents in concrete social practices.

Distinguishing between the features offered by artifacts and the resources generated in using those artifacts allows us to examine how technological features are used (or not used) in the enactment of particular resources in various circumstances, and when or how enacted resources may depart from those prescribed by developers or implementors, and across time and context. For example, the simple technological artifact, the hammer, can be used by a carpenter making a chair, a construction worker building a condominium complex in the suburbs, an auto mechanic panel-beating a fender back into shape, and a sculptor chipping away at stone to produce a piece of art. In these various uses, the same technological artifact becomes a resource generating a variety of capabilities for action. Indeed, a hammer may even generate useful capabilities for my action. Most of the time a hammer just lies, buried and half-forgotten in the bottom of my kitchen closet and as such does not serve as a resource in my ongoing activities. But there are some situations when its material properties will come in handy and on those occasions -- when I use it to take action in the world such as hanging a picture on a wall or arming myself against an unwanted intruder -- that hammer becomes a resource. Thus, across time and a diversity of places -- the woodshop, the construction site, the garage, the art studio, and my home -- a particular technological artifact, the hammer, is implicated in the production and reproduction of multiple and various social practices --furniture making, building construction, automotive repair, art, home improvement, and self-defense. In these various uses of a single technological artifact, a range of technologies-in-use can be enacted, some anticipated by its developers, others not.

Technologies-in-Use: Rules and Resources

While the above discussion has consider rules and resources separately, in practice they are inherently and reciprocally dependent on each other. The manipulation of resources always involves both substantive and normative aspects of knowledge, while, resources provide the means by which these substantive and normative rules are actualized (Cohen, 1987:287). As structures, technologies-in-use are produced, reproduced, and sometimes modified in the ongoing enactment of rules and resources through mobilization of knowledge and capabilities. And the kind

(12)

of technology-in-use that is generated depends on the features of the artifact, the knowledge and intentions of the actors, as well as historical and institutional conditions. While the carpenter, auto mechanic, and sculptor all use a hammer in their work, the technologies-in-use they generate -- the particular rules and resources that structure their action -- are very different, as are the outcomes of that use. And it is in these differences between a given artifact and its various uses by different actors across contexts and time, that the creative and transformative aspects of technology as practice lie.

INVESTIGATING TECHNOLOGIES-IN-USE

Investigating the structuring of technologies-in-use requires the identification and collection of data on the technological artifact in question, the knowledge users have of the artifact, the institutional contexts of use, and the actions taken by users with the artifact. These data can then be analyzed to identify patterns of use which embody particular rules and resources, and the consequences, intended and unintended, of such patterns of use. The intent in the analysis is to examine whether and why users' social practices involving a particular technological artifact result in the enactment of different technologies-in-use, and what the organizational implications of such practices are. Giddens (1979) suggests that an explication of virtual structures requires examining actors' knowledge (memory traces, whether explicit or tacit, of "how things are to be done"), their social practices (organized through the recursive mobilization of that knowledge), and the capabilities implicated in the production of their practices. Likewise, the virtual technologies-in-use may be investigated by examining those social practices that involve technological artifacts, and the relevant knowledge and capabilities used by actors to accomplish those practices.

The technological artifact can be examined by interviewing the artifact's key designers and promoters and probing on their motivation and intentions for the artifact, their design approaches and decisions, as well as the influences on these choices. As Suchman (1983:3) points out: "Every human tool relies upon, and reifies, some underlying conception of the activity that it is designed to support." It is that underlying conception of the activity that is of interest when interviewing tool developers. The documentation accompanying the artifact's production, packaging, and promotion, as well as any instruction manuals can also be analyzed. Observation of the artifact in operation, further provides materials for characterizing the features and functionality of the given artifact. DeSanctis and Poole (1994:126) suggest examining a technology's "feature set" as a way of identifying the "social structures provided by an advanced information technology." However, they do not differentiate between technological artifacts and technologies-in-use, and hence imply that social structures are embodied in given artifacts. The perspective presented in this paper posits instead that the feature set of a given artifact provides some of the potential capabilities that actors

(13)

invoke as rules and resources in their enactment of technologies-in-use. A number of dimensions for characterizing the feature set of an artifact have been proposed (DeSanctis and Poole, 1994) and one or other of these may be followed, or dimensions may be constructed from the data. The intent is to describe those features that are generally available as potential capabilities to be drawn on by users in their action, rather than exhaustively characterize every aspect of the artifact.

The enactment of technologies-in-use depends on the knowledge that users have of the artifact and their institutional context, their motivation and skills in applying that knowledge, and the conditions of their action. The repeated enactment of a technology-in-use depends on knowing what is possible (technical feasibility) and what is useful, effective, and appropriate (institutional feasibility) within a particular context of use. Users' knowledge of technical and institutional feasibility may be explored by seeking data on users' technological frames (Bijker, 1987), which Orlikowski and Gash (1994) define as the assumptions, expectations, and knowledge that organizational members draw on to understand and use technological artifacts in their work. This includes not only the nature, role, and functionality of the artifact itself, but the specific conditions, applications, and consequences of its use in particular contexts. Some aspects of technological frames are part of users' discursive consciousness, and others are tacit, part of their taken-for-granted practical consciousness.

As knowledgeable, reflexive actors, users have motivations and intentions for taking certain action, even if these are not always realized, or realized as intended. Such actions also, inevitably, produce unintended consequences. Skills in using a technological artifact are usually influenced by knowledge, cognitive ability, training, and experience, and are particularly relevant in the enactment of certain and different technologies-in-use. Knowledge of the artifact by users can be obtained by observing users' interactions with the artifact, and interviewing them about their understandings of the artifact and its functionality. Actions taken by participants towards the artifact can be studied by direct observation as well as by interviewing participants about their actions and intentions. The latter approach may be quite informative, as Giddens (1993:92) notes: "... given that [an actor] is not dissimulating, her or his testimony as to the purpose and reasons for her or his conduct is the most important, if not necessarily conclusive, source of evidence about it." The institutional context of use can be investigated by focusing on dimensions of the workplace that embody the rules and resources guiding action, such as tasks, division of labor, norms, incentive systems, roles, and control mechanisms.

The value of the technology-in-use perspective became particularly apparent after I had completed two field studies into the implementation and use of a particular technological artifact, the Notes®

(14)

software product ([cites suppressed]). The range of technologies-in-use enacted with this same artifact both across as well as within the organizations highlights the value and importance of the technology-in-use perspective proposed here. Some of the technologies-in-use varied considerably from designers' or implementors intentions, some varied by context and over time, and others involved innovation around the prescribed features. Such uses and their associated organizational outcomes would not have been predicted by an examination of the artifact in question or users' constructions of it. Before examining the technologies-in-use enacted with the Notes artifact, a discussion of the artifact is appropriate.

Technological Artifact: Notes

Data about the technological artifact were collected by interviewing its chief designer and two individuals involved in its product development. All three interviews lasted just over an hour in length and were largely unstructured in format to allow for open-ended discussion about the technological artifact. Further information about the artifact was obtained from product descriptions and promotional materials provided by the vendor, as well as trade reports published by software reviewers. I also had access to the artifact itself, and could examine its espoused features and prescribed functionality.

The Notes technological artifact differs from typical organizational software products which are intended to support either transaction processing (such as order entry and inventory systems), or individual work (such as spreadsheet or word processing programs). Notes represents a class of software product that has come to be known as "groupware," where the intent is to support the work of groups by facilitating discussion, information exchange, and collaboration across time and space. The CEO of Lotus noted in a speech in 1991 that groupware and Notes, represent "a shift from notions of information processing to information sharing," which provide "a new paradigm for computing in the nineties." The intellectual roots of this new type of organizational computing are located in the research community of computer and social scientists who, in the early eighties, began studying what they call "computer-supported cooperative work".

The Notes software operates on personal computers connected to local area networks, and the capabilities it provides are communication tools (via electronic mail and bulletin boards), document management (via shared databases), security (via public key encryption of electronic information), and application development (through customization of existing database templates, or construction with a built-in programming language). The major features of the artifact as espoused by its developers are summarized in Table 1. Notes requires both a "client," the software which runs on each users' machine and which offers a graphical, tailorable, icon-based user interface, and the

(15)

"server," the software which runs on the network and manages the communication among users ("clients") and their shared access to databases and bulletin boards maintained within the Notes environment, both locally and remotely (see Figure 1). The Notes product is sold and distributed by the Lotus Development Corporation, but it was developed by a small organization working with funding from Lotus. The founder of the firm and chief architect of Notes, was Ray Ozzie, a former employee of Lotus. My data revealed a number of influences on the design and construction of the Notes artifact: historical, institutional, and market.

Historical influences. The origin of the Notes artifact has roots in the Plato system at the University

of Illinois at Urbana-Champaign. While a student of computer science in the seventies, Ozzie was exposed to the Plato system, a mainframe-based computing environment on the Illinois campus developed by researchers to test the feasibility of on-line tutoring systems. Technically, the Plato system was ahead of its time with graphical, interactive interfaces and communication software which facilitated campus-wide computer conferencing. Written by a local systems programmer and known as Plato Notes, the communication software made a big impression on Ozzie, as he recalled years later:

The [Plato] Notes tool was created to help systems programmers communicate with each other. But I saw other people, people who had no knowledge of computers, using this tool to collaborate on projects, to interact, to establish relationships with other people, people they had never seen or met. It was amazing.

After graduating and working in the software industry for a number of years, Ozzie returned to the communication capabilities that had so influenced him in Illinois:

In the early 80s I was working in spreadsheets, but spreadsheets didn't turn me on. So my mind turned to Plato and what I had experienced there -- collaboration and communication. I wanted to start my own company to develop those things.

This prior exposure to and experience of a mainframe-based "groupware" functionality clearly shaped Ozzie's mental model of the kind of technological capability that could be provided, and why and how it might be useful. He indicated that his vision for the Notes artifact came from the simple and single idea of providing a tool that would support collaboration among individuals. He believed that such a tool could be useful more broadly, although admits that at that time he did not have any real evidence for this belief:

My vision came from the fact that I saw lots of people in little research groups collaborating across the world with this tool. ... I had never really worked in a corporate culture and did not understand the dynamics of a business, and how people worked in them. But I knew that great things would happen if they communicated and talked to each other.

Ozzie started his own company in 1984 with financing from Lotus Development Corporation. He hired four colleagues, two of whom were college buddies who had also experienced the Plato system. The five developers then spent a number of years (from 1984 to 1989) designing, building, and testing the Notes artifact. While funded by Lotus, the team retained creative and

(16)

technical autonomy, designing and building the Notes product from the blueprint developed by Ozzie in 1984. Most of the critical design decisions had been determined early, as Ozzie explained:

I had a high-level idea of what I wanted to do. ... I had envisioned Notes to have such functions as conferencing, word processing, mail, and so on. ... So from day one, it had a graphic user interface, client

server architecture, and public key cryptography. So all the major design decisions were made before we started. The inspiration for the functionality of the Notes artifact was clearly Plato Notes, with the ideas for the technical implementation coming from some of the other computing platforms the five designers knew about or had experienced in their years since college, as Ozzie noted:

There is virtually nothing unique about Notes. My highest level goal of the utmost user collaboration came from Plato. The architectural foundation came from personal computers and networks, that is, local-area networks from Data General and PC's from Software Arts.

Notable in the inventors' view of Notes, is a lack of specificity about the ways in which the tool would be used in organizational settings. Ozzie commented that:

The product as shipped was essentially the creative vision of the founders. We still had not participated in real businesses, so we didn't know what they [organizations] would use it for.

Institutional influences. Many of the design decisions that were made in the construction of the

Notes artifact were strongly influenced by the values and norms of the five-person development team, and the kinds of work processes they had established. As these five individuals created the Notes artifact, they were also creating an institutional context, and many of the norms and procedures established for their company also informed their product development work, and were embodied in the artifact. Ozzie explained that they deliberately created a software development context which was different from that of many technological production environments:

As a group of individuals we share the same beliefs about how we'd like to see people work -- the Iris values.

We implemented a very different software development methodology here that relies on distributed management, distributed security, and distributed development. ... It's an anarchistic model of source code management which we deal with by having tools that resolve conflict among us. Centralized management is something that is counter to how we feel, to our philosophy.

This philosophy of decentralized control enacted within the Notes development environment is strongly reflected in all aspects of the Notes artifact, which has a highly distributed architecture. One of the features of the artifact is the ability for users to create customized applications which utilize the underlying Notes functionality. As Ozzie notes, the capability to "build" applications was extended to any user, in conformance with the overall design philosophy of the developers:

A design debate we had a lot was does every copy of Notes have the ability to design applications or do we have a developer's copy and user copies? In practice, while it is a nightmare for the MIS person to have this [design] capability on every copy of Notes, it makes the product more exciting for the users because anyone can turn from a user to a developer overnight. We wanted individuals to have independence over their work. Distribution is a value that pervades our philosophy. So technically and architecturally the product [Notes] embraced distribution.

Market influences. Because the notion of groupware was not well established in the late eighties,

Lotus, who assumed responsibility for marketing and selling the Notes product, struggled to put a label on the artifact that would convey its functionality to prospective users. As Ozzie recalls:

(17)

[Lotus] thought Notes was a good idea. But they had no idea of how to sell it. ... One person on the Lotus project review team for the product -- from Marketing -- said "I don't like it because I don't know how to sell it." He was right. It did not look like a shrink-wrapped product.

A number of Notes supporters within Lotus decided to get some early customer feedback on the product, so they set up a group of some 30 customers to test the product. These early customer responses helped significantly to define the artifact, as two product managers recalled:

We held a round table session in the first quarter of 1989 -- customers, developers, marketing people -- all sitting around talking about the product. It was unusual to do that at Lotus. We were all looking for the sound bite. [One senior executive] had a great insight. He said "Let the customers define your product for you. Tell the world what the first customer says it is. Let the market position it for you."

We went around and talked to these [test] customers -- we saw them as our "design partners" -- and got their feedback. Then we incorporated their ideas and feedback into our presentations at the next customer. Maybe this was cheating, but it was an iterative definition of the product.

This decision to "let the customer define your product" generated a better understanding of what the artifact might be useful for in the market. Ozzie admits:

I have been educated. I am an engineer by trade. I didn't go to business school. If I had, I would have understood better what I was building.

Customer participation in product definition also generated much interest in Notes among these early beta sites, and many became official customers once the product was launched in late 1989. As an artifact, Notes was designed and constructed by a group of computer designers, to implement in a personal computer environment the capabilities of document sharing and electronic communication that had previously only been available in a mainframe environment. It was deliberately designed to embody a decentralized architecture and allow ongoing user adaptation to the artifacts. Its positioning in the marketplace was influenced by a number of factors, most importantly the growing interest in and spread of local area networks, the academic interest in computer-supported collaborative work, and key customers experiences during beta testing. The definition of Notes as groupware, as a new paradigm of organizational computing was clearly a social construction -- a marketing strategy to differentiate the product from other artifacts such as spreadsheets and electronic mail systems, and to position it as a strategic product for organizations operating in global, team-based conditions.

Enacting Technologies-in-Use with the Notes Technological Artifact: Alpha

I studied the implementation and use of the Notes artifact within a large, multi-national consulting firm (here known as Alpha). Alpha has offices in hundreds of cities around the world and employs over 10,000 consultants who work on project engagements within a matrix operating structure to deliver professional services to clients. In the late eighties, a Chief Information Officer (CIO) position was created with responsibility for Alpha's global use of information technology. Having been recently exposed to the Notes technological artifact, the CIO was persuaded that it offered the functionality to not only provide corporate-wide electronic mail support, but also to facilitate

(18)

electronic discussions and knowledge sharing. These capabilities, he believed, would address the considerable "reinvention of the wheel" which occurred within Alpha when consultants in different offices worked on similar client problems without sharing knowledge, approaches, or solutions, and thus duplicating effort and not leveraging the existing expertise and experience of the firm. The CIO purchased thousands of copies of Notes for Alpha's consultants, and ordered his staff to install it (and the supporting infrastructure of hardware and networks) quickly in all offices, so as to achieve a critical mass of users as soon as possible.

My study within Alpha was conducted in 1991, about a year after the firm's acquisition of Notes. A five-month field study was concentrated within one large practice office (see [cite suppressed] for more details). Data collection included interviews, document review, and observation of meetings, work sessions, and training classes. Participants spanned all four of Alpha's hierarchical levels (junior consultant, senior consultant, manager, and principal), included some administrative and technology support personnel. The data collected at Alpha were analyzed by careful reading and recursive coding to identify how use of the technological artifact reflected and shaped the rules and resources enacted in such use. A qualitative approach was used to analyze the data in terms of the categories of interest identified above. Because technologies-in-use, as social structures, are virtual, they cannot be directly observed, and must be inferred. Data about participants' actions, complemented by data about participants' knowledge of the artifact, their intentions, motivations, as well as their institutional context of use, grounded the inferences about the kinds of technologies-in-use being enacted.

Consultants working on client engagements performed a range of managerial and technical consulting services, some standardized and routine, some unique and research-intensive. Most of the actual work was done by the junior and senior consultants working at clients' sites, with managers and principals providing supervision and managing client relations from the office. All the consultants were, to a greater and lesser extent, influenced by (and in turn, reinforced) the Alpha institutional context within which they worked. The dimensions of the institutional context held different salience for different consultants, depending on status, role, tenure, and individual differences. Four distinct types of technologies-in-use characterized the interaction of Alpha consultants with the Notes artifact (see Table 2). The first of these--technological shunning--is essentially a pattern of nonuse where users choose not to use the artifact at all. The

second--technological skepticism--is a pattern of use where users doubt the artifact can provide any

benefits, so they attempt only limited and half-hearted uses of its capabilities. The

third--technological substitution--is a pattern of use where users utilize the artifact to perform

electronically what had previously been done in other ways, for example, distributing memos Ill

(19)

electronically rather than on paper or sending electronic mail instead of voice mail or faxes. The

fourth--technological exploration--is a pattern of use where users are interested in using the artifact

in their work, but their use is wary, short-lived, and episodic, either because they lack necessary skills and knowledge or because they are concerned about the consequences of such use within their institutional context. Let us look briefly at each in turn.

Technological Shunning

For consultants engaging in the technological shunning pattern of use, the institutional features of their context were particularly influential. Alpha's governance structure -- a partnership -- with its attendant "up or out" career path which controls progress of all consultants via four primary milestones influenced consultants to act competitively. This competitive culture was felt most keenly by senior consultants and managers anticipating the partnership hurdle, and they believed that their use of Notes would hurt, not help, their chances of promotion. For example:

Power in this firm is your client base and technical ability. ... Now if you put all this information in a Notes database you lose power. There will be nothing that's privy to you, so you will lose power. It's important to me that I am selling something that no one else has.

In Alpha we have a lot of problems getting people to share expertise and information. That is not in the culture. ... People hide information because it gives them an edge.

I'm trying to develop an area of expertise that makes me stand out. If I shared that with you you'd get the credit not me.

The corporate psychology makes the use of Notes difficult. Particularly the consultant career path which creates a back-stabbing and aggressive environment. People aren't backstabbing consciously, it's just that the environment makes people maximize opportunities for themselves.

For many consultants, use of Notes in an environment of competitive individualism -- which reinforced individual effort and ability, and did not support cooperation or sharing of expertise --meant risking their expertise and status. As a result, they chose not to use it.

Other consultants engaged in technological shunning as a response to billing practices. For all consultants except principals, there was an expectation within Alpha that most if not all hours should be "chargeable," that is, billed to clients and hence revenue-producing. Consultants were evaluated on how many "below the line" (i.e., nonchargeable) hours they incurred and most consultants studiously avoided having any.1Because many of the consultants did not perceive using Notes as an activity that could be billed to clients, they were unwilling to spend time on it, either to learn or to use the product, as this meant either incurring "nonchargeable hours" or giving up personal time. For example:

I am not sure seniors have time to learn or use Notes.... As a senior on an engagement your entire time is chargeable. You're not entitled to charge nonchargeable hours.

1 Even though they had been told to charge their time I spent interviewing them to a professional activities code, many consultants confided that they would "swallow the time" so as to avoid any dreaded "below the line" hours.

(20)

Intellectually I understand the need to use something like Notes, but when we make an investment in Alpha to learn systems or technology usually that is not a chargeable hour, that is, it is "below the line." But it is a chargeable hour I could have spent elsewhere. ... Seniors and managers never have nonchargeable hours. It's just not done. It doesn't happen.

We don't have the time to read or enter information in Notes. What would I charge it to? We already complain that we can't charge our reading of our mail to anything. We end up having to charge it to ourselves [he reads his mail on the train going home].

While the acquisition of Notes and its attendant technical infrastructure was decided by the President and CIO, the spending of time and money on training and application development was left to the discretion (and budgets) of individual principals in local offices. One principal, a more enthusiastic Notes supporter, reported frustration at his more reluctant colleagues:

One of the biggest problems we have here is turf battles, i.e., keeping score by office and department. So people get protective of their time and resources and don't want to spend money on training or database development.

Evaluation criteria of consultants were not amended to reflect use of the Notes artifact, and consultants were not rewarded for using the Notes artifact. On the contrary, some were negatively affected when their use of Notes incurred "non-billable" hours and implied loss of some unique competence. Thus, consultants' enactment of the technological shunning pattern of using the Notes artifact was strongly influenced by the firm's institutional context with its partnership structure, competition, individual evaluation criteria, incentives, norms, and time-based billing practices. Such a pattern of use, in turn, served to further reinforce the firm's existing institutional context.

Technological Skepticism

A pattern of technological skepticism was enacted by consultants who had doubts about the value of the artifact in their work and whose use of Notes consequently remained limited. The technology-in-use reflects a lack of conviction by the users that the artifact could improve either their personal or the firm's performance. Some of these consultants were skeptical about technology in general and applied this same skepticism to the particular case of Notes, as in this principal's reaction:

I first heard about Notes when I read in the Wall Street Journal that Alpha had purchased a revolutionary new piece of software. My first thought was -- how much is this costing me personally? ... this kind of implementation affects all of our pocketbooks. ... I have [heard that] there is no value in information technology -- so you can imagine how I feel!

and that of a manager:

My workstyle is heavily interpersonal and oral. So far computers have not really saved me time. I am not interested in doing all that protocol stuff to get access. I don't want to deal with a programmer's conception of the world. ... I approach Notes with the attitude "Do I really need this?" ... I see computers as black and white, and so as not really suitable to my work.

Others based their skepticism on an assumption that the Notes artifact primarily facilitated static or unreliable information transfer. For example:

(21)

I don't believe that Notes will help our business that much, unless all of our business is information transfer. It's not. Business is based on relationships. Ideas are created in non-work situations, socially, over lunch, etc. People misreport information in databases; a few phone calls are worth more. Most of the stuff on Notes is junk mail. Anything important comes over the phone. I am very skeptical of the value of Notes.

A vivid illustration of user skepticism occurred a few days after I had interviewed a manager. Arriving to work in the morning, he sought me out, commenting: "The other day you asked me what I thought of Notes. Well, here's your answer." He then handed me a cartoon he had clipped from that morning's newspaper (see Figure 2).

Consultants who enacted the technological skepticism pattern of using the Notes artifact often had limited knowledge of the artifact's capabilities, even after taking the hands-on training class, watching the half-hour video, and receiving copies of users' guides. None of these training options emphasized the collaborative capabilities of Notes, and did little to illustrate how Notes could be used in consulting practice. The training sessions and materials were technical, non-specific in content, and dealt with the mechanics of using the software individually, for example, how to utilize functions such as electronic mail, text editing, and database browsing. Most consultants found the training less than helpful. One manager referred to it as "condescending," while another noted: '"Training here is so basic it doesn't tell you much." Many consultants had not referred to the users' guides, which often lay, still shrink-wrapped, in the corner of their offices. The particular mental model consultants developed of Notes as a result of the training sessions and materials, encouraged some of the skepticism and disinclination to spend much time using the artifact. While these consultants occasionally used Notes, their skepticism and lack of enthusiasm qualifies their use as little more than dabbling. Of the consultants that I shadowed, half enacted this technological skepticism pattern of use, and on average, used Notes for two minutes a day -- merely to check their electronic mail. A comment from one principal captures the sense of this pattern of use:

At this moment I use Notes less than five minutes a week ... I look at it when I am on the phone, to kill time when I am bored.

Consultants' enactment of the technological skepticism technology-in-use were strongly influenced by their prior experiences with information technology and their mental models about what such artifacts could accomplish in practice. The process of implementing the Notes artifact within Alpha did not offer counter-examples and did not help consultants' change their mental models. The lack of work and context specificity to the training and applications only served to further reinforce these consultants' prior skepticism, and created the notion that this artifact was merely "a solution in search of a problem."

Technological Substitution

The third type of technology-in-use identified among the consultants involves use of the artifact to substitute for some existing ways of doing things. This technology-in-use is a common response

(22)

to unfamiliar technological artifacts. As Barley (1988:50) notes, there is evidence that "workers attempt to assimilate new technologies under previous patterns of practice and interpretation." In the absence of new interpretations and routines, actors often deal with new technological artifacts by applying existing cognitive frameworks to make sense of them, by subsuming use of the artifacts within established routines, and employing the artifacts to solve existing problems.

In the case of Alpha, a number of consultants and administrative staff began to use the Notes artifact for activities they had previously conducted in other media. For example, they began distributing memos electronically rather than on paper, sending one-to-one or broadcast electronic mail messages rather than leaving voicemail messages, and transferring files to other offices rather than sending faxes or using express mail. Some managers also browsed Notes databases to read electronic newsfeeds from Reuters and industry newsletters. Users enacted this technology-in-use conceived of Notes in familiar terms,

I see Notes as a personal communication tool. That is, with a modem and fax applications I can do work at home or at a client site and use Notes to transfer work back and forth. In the office instead of getting my secretary to make 20 copies of a memo, she can just push a button.

and found familiar uses for Notes in their everyday activities:

I use Notes a lot to look up the [consulting topics] index. It used to be a pain to use it before as you used to have to get up and walk over to another computer. I never bothered to do it and would get my staff to do it. Now I can just access it from my Notes menu.

I send Notes [electronic mail] when I really don't want to talk to some people. I have no time for niceties or phone chatter, but I want them to get my point and Notes leaves a paper trail.

The technological substitution pattern of use was compatible with the firm's existing institutional context because by automating existing tasks it did not risk violating norms of individualism and time-based billing practices. Users utilized the artifact as a filing cabinet, a distribution channel, and communication medium, and did not attempt to substantially change their work practices with it. The technological substitution pattern of use typically provides incremental improvements in existing ways of doing things; it is less likely to produce significant organizational changes.

Technological Exploration

The final pattern of use involved consultants who were interested in the possibilities of using Notes more centrally in their work, but were cautious in doing so. While they were willing to experiment with alternative capabilities, they struggled to fully integrate use of the artifact into their work practices. In contrast to the users who saw the firm's competitive institutional context as a barrier to using Notes (and hence engaged in technological shunning), the users enacting technological exploration saw Notes as an opportunity to avoid expectations of reciprocity and to promote themselves within the competitive institutional context, for example:

The value of Notes is that it allows access to information without having to confront individuals, or deal with the quid pro quo stuff that goes on in personal exchange of information.

(23)

I want to be able to share more within Notes. ... to the extent you make an impression, people will recognize you're a [domain] expert and will call on you more. That will make you more visible. If you're a hotshot but no one knows it, that doesn't help you.

Things on Notes have authorship and that allows you to disseminate your expertise further than you normally would. I think that could be a plus.

Realization of these opportunities, however, remained difficult because users continued to be puzzled about aspects of the artifact and conditions of its use. These puzzles were not borne of skepticism but from uncertainty about how the technology works in practice, and ambiguity about the consequences of its use. One significant issue concerned questions of liability, both personal and corporate. Principals, in particular, were worried about the disclosure of corporate information, client confidentiality, and perceptions of unfair billing practices, for example:

We need to worry about who is seeing the data. ... Managers should not be able to access all the information even if it is useful, [e.g.] financial information to clients, because they leave and may go work for competitors. Client confidentiality is an important issue. The tension is between revealing something about a client that you should not have, and keeping other people informed about what you are doing. ... There are no safeguards currently in force to deal with this in [Notes]. That is why people are so gun-shy of using Notes.

What happens if work is repackaged and sold to other clients. ... Clients may have a problem if they know that a report or the expertise that they paid for will be made available to others. There may be a double standard going on in the firm. We talk a lot about sharing expertise but we have real client service issues which we don't talk about.

Managers and senior consultants were also anxious about personal vulnerability or embarrassment:

I would be careful what I put out on Notes though. I like to retain personal control so that when people call me I can tell them not to use it for such and such. But there is no such control within Notes.

There is a hesitancy here because you don't want to put everything into public information as people may rely on that information and screw up, and it may reflect badly on you.

These comments reflect users' recognition of the lack of guidelines, policies, and procedures for using the new technological artifact. While discerning this, they seemed unwilling or unable to take the initiative to resolve some of the open questions. The CIO had deliberately chosen not to define new organizational policies for data quality, confidentiality, and liability, seeing this as outside of his jurisdiction:

We have a relatively open environment in the firm, so we leave privacy and security up to the local people.... As Notes, we're a common carrier; we make no guarantees about data quality.

Contrary to the CIO's expectation, neither the management of the HQ nor that of the local offices, had devoted time and attention to these issues, hence provoking unease about the nature and locus of responsibility and liability with respect to the intellectual content and confidentiality of Notes documents. This significantly contributed to some of the cautious interaction and tentative experimentation apparent around the Notes artifact.

The technological exploration pattern of use, in contrast to all of the previous three technologies-in-use, has the potential to produce interesting and innovative changes. In this technology-in-technologies-in-use, users are not attempting to reproduce established ways of working, but are willing to explore

Références

Documents relatifs

In the study examined in this paper, intended at the start to analyse the reuse of problem- solving elements in design, what came to light is that the use of other types

The Team Orienteering Problem (TOP) [4] is a widely studied Vehicle Routing Problem (VRP) which can be described as follows: a fleet of vehicles is avail- able to visit customers from

The intensity of multi-tasking n (the number of tasks per individual) as well as the level of consumption c increase with the efficiency of human capital E, the size of the workforce

In part 1 of the psudocode an empty solution is created and for every requested component of the problem model, a valid software assignment is added to the solution.. Each component

Description of the autonomous intelligent agent with a set of state vari- ables, input and sensory variables that communicate with other agents and the environment, as well as

These properties include the fit of the process model to a task the user is aiming at repeatedly using it for, a users´ perception about the quality of the process model,

Across both classroom contexts, working in a computer lab with wired Internet connections assured ready access with adequate bandwidth for multiple computers downloading video. When

5 Paul Standish (1999) ‘Education without aims’ in Roger Marples (ed.), The Aims of Education.. provides, such as mutual support, but as an inherently valuable form of